Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -591,7 +591,7 @@
"type": "string",
"x-ms-enum": {
"modelAsString": true,
"name": "ThreatIntelligenceResourceKindEnum",
"name": "ThreatIntelligenceResourceInnerKind",
"values": [
{
"description": "Entity represents threat intelligence indicator in the system.",
Expand Down Expand Up @@ -985,7 +985,7 @@
"type": "string",
"x-ms-enum": {
"modelAsString": true,
"name": "ThreatIntelligenceSortingCriteriaEnum",
"name": "ThreatIntelligenceSortingOrder",
"values": [
{
"value": "unsorted"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2183,7 +2183,7 @@
"value": "CredentialAccess"
},
{
"description": "Discovery consists of techniques that allow the adversary to gain knowledge about the system and internal network. When adversaries gain access to a new system, they must orient themselves to what they now have control of and what benefits operating from that system give to their current objective or overall goals during the intrusion. The operating system provides many native tools that aid in this post-compromise information-gathering phase.",
"description": "Discovery consists of techniques that allow the adversary to gain knowledge about the system and internal network. When adversaries gain access to a new system, they must navigate themselves to what they now have control of and what benefits operating from that system give to their current objective or overall goals during the intrusion. The operating system provides many native tools that aid in this post-compromise information-gathering phase.",
"value": "Discovery"
},
{
Expand Down